Search criteria
2 vulnerabilities found for zxone_9700_firmware by zte
CVE-2021-21726 (GCVE-0-2021-21726)
Vulnerability from nvd – Published: 2021-03-12 18:05 – Updated: 2024-08-03 18:23
VLAI?
Summary
Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:<ZXONE 9700 , ZXONE 8700, ZXONE 19700><V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
Severity ?
No CVSS data available.
CWE
- input verification
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | <ZXONE 9700 , ZXONE 8700, ZXONE 19700> |
Affected:
<V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:23:28.330Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "input verification",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-12T18:05:34.000Z",
"orgId": "6786b568-6808-4982-b61f-398b0d9679eb",
"shortName": "zte"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@zte.com.cn",
"ID": "CVE-2021-21726",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
"version": {
"version_data": [
{
"version_value": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "input verification"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664",
"refsource": "MISC",
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6786b568-6808-4982-b61f-398b0d9679eb",
"assignerShortName": "zte",
"cveId": "CVE-2021-21726",
"datePublished": "2021-03-12T18:05:34.000Z",
"dateReserved": "2021-01-04T00:00:00.000Z",
"dateUpdated": "2024-08-03T18:23:28.330Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-21726 (GCVE-0-2021-21726)
Vulnerability from cvelistv5 – Published: 2021-03-12 18:05 – Updated: 2024-08-03 18:23
VLAI?
Summary
Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:<ZXONE 9700 , ZXONE 8700, ZXONE 19700><V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
Severity ?
No CVSS data available.
CWE
- input verification
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | <ZXONE 9700 , ZXONE 8700, ZXONE 19700> |
Affected:
<V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:23:28.330Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "input verification",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-12T18:05:34.000Z",
"orgId": "6786b568-6808-4982-b61f-398b0d9679eb",
"shortName": "zte"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@zte.com.cn",
"ID": "CVE-2021-21726",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
"version": {
"version_data": [
{
"version_value": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "input verification"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664",
"refsource": "MISC",
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6786b568-6808-4982-b61f-398b0d9679eb",
"assignerShortName": "zte",
"cveId": "CVE-2021-21726",
"datePublished": "2021-03-12T18:05:34.000Z",
"dateReserved": "2021-01-04T00:00:00.000Z",
"dateUpdated": "2024-08-03T18:23:28.330Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}